{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T12:18:42Z","timestamp":1772885922647,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s00521-019-04453-w","type":"journal-article","created":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T12:02:42Z","timestamp":1566820962000},"page":"9427-9441","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":119,"title":["A whale optimization algorithm-trained artificial neural network for smart grid cyber intrusion detection"],"prefix":"10.1007","volume":"32","author":[{"given":"Lida","family":"Haghnegahdar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1829-3836","authenticated-orcid":false,"given":"Yong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"issue":"1","key":"4453_CR1","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1109\/TPWRD.2017.2669110","volume":"33","author":"Y Wu","year":"2018","unstructured":"Wu Y, Xiao Y, Hohn F, Nordstr\u00f6m L, Wang J, Zhao W (2018) Bad data detection using linear WLS and sampled values in digital substations. IEEE Trans Power Delivery 33(1):150\u2013157","journal-title":"IEEE Trans Power Delivery"},{"issue":"1","key":"4453_CR2","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/JPROC.2011.2165269","volume":"100","author":"S Sridhar","year":"2012","unstructured":"Sridhar S, Hahn A, Govindarasu M (2012) Cyber-physical system security for the electric power grid. Proc IEEE 100(1):210\u2013224","journal-title":"Proc IEEE"},{"issue":"2","key":"4453_CR3","first-page":"174","volume":"17","author":"S Pan","year":"2015","unstructured":"Pan S, Morris TH, Adhikari U (2015) A specification-based intrusion detection framework for cyber-physical environment in electric power system. Int J Netw Secur 17(2):174\u2013188","journal-title":"Int J Netw Secur"},{"issue":"4","key":"4453_CR4","doi-asserted-by":"crossref","first-page":"1665","DOI":"10.1109\/TSG.2013.2291661","volume":"5","author":"X Liu","year":"2014","unstructured":"Liu X, Li Z (2014) Local load redistribution attacks in power systems with incomplete network information. IEEE Trans Smart Grid 5(4):1665\u20131676","journal-title":"IEEE Trans Smart Grid"},{"key":"4453_CR5","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1016\/j.procs.2016.07.238","volume":"93","author":"GP Gupta","year":"2016","unstructured":"Gupta GP, Kulariya M (2016) A framework for fast and efficient cyber security network intrusion detection using apache spark. Procedia Comput Sci 93:824\u2013831","journal-title":"Procedia Comput Sci"},{"issue":"2","key":"4453_CR6","doi-asserted-by":"crossref","first-page":"886","DOI":"10.1109\/TSG.2016.2570546","volume":"9","author":"AF Taha","year":"2016","unstructured":"Taha AF, Qi J, Wang J, Panchal JH (2016) Risk mitigation for dynamic state estimation against cyber attacks and unknown inputs. IEEE Trans Smart Grid 9(2):886\u2013899","journal-title":"IEEE Trans Smart Grid"},{"key":"4453_CR7","unstructured":"Haghnegahdar L, Wang Y (2018) Cyber security and risk analysis in power systems. In: 2018 Proceedings of IISE industrial & systems engineering research conference (ISERC), pp 349\u2013354"},{"issue":"2","key":"4453_CR8","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/TII.2016.2614396","volume":"13","author":"R Deng","year":"2017","unstructured":"Deng R, Xiao G, Lu R, Liang H, Vasilakos AV (2017) False data injection on state estimation in power systems\u2014attacks, impacts, and defense: a survey. IEEE Trans Industr Inf 13(2):411\u2013423","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"4453_CR9","first-page":"14","volume":"5","author":"S Mehrdad","year":"2018","unstructured":"Mehrdad S, Mousavian S, Madraki G, Dvorkin Y (2018) Cyber-physical resilience of electrical power systems against malicious attacks: a review. Curr Sustain Renew Energy Rep 5(1):14\u201322","journal-title":"Curr Sustain Renew Energy Rep"},{"key":"4453_CR10","doi-asserted-by":"crossref","unstructured":"Waghmare S, Kazi F, Singh N (2017) Data driven approach to attack detection in a cyber-physical smart grid system. In: 2017 IEEE in control conference (ICC), pp 271\u2013276","DOI":"10.1109\/INDIANCC.2017.7846487"},{"key":"4453_CR11","unstructured":"Pan K, Teixeira A, Cvetkovic, Palensky P (2017) Data attacks on power system state estimation: limited adversarial knowledge vs. limited attack resources. arXiv Preprint \narXiv:1708.08355"},{"key":"4453_CR12","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.eswa.2014.08.002","volume":"42","author":"S Elhag","year":"2015","unstructured":"Elhag S, Fern\u00e1ndez A, Bawakid A, Alshomrani S, Herrera F (2015) On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert Syst Appl 42:193\u2013202","journal-title":"Expert Syst Appl"},{"issue":"5","key":"4453_CR13","doi-asserted-by":"crossref","first-page":"2670","DOI":"10.1016\/j.eswa.2014.11.009","volume":"42","author":"AS Eesa","year":"2015","unstructured":"Eesa AS, Orman Z, Brifcan AMA (2015) A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Syst Appl 42(5):2670\u20132679","journal-title":"Expert Syst Appl"},{"issue":"3","key":"4453_CR14","doi-asserted-by":"crossref","first-page":"1244","DOI":"10.1109\/TSG.2013.2245155","volume":"4","author":"A Giani","year":"2013","unstructured":"Giani A, Bitar E, Garcia M, McQueen M, Khargonekar P, Poolla K (2013) Smart grid data integrity attacks. IEEE Trans Smart Grid 4(3):1244\u20131253","journal-title":"IEEE Trans Smart Grid"},{"issue":"3","key":"4453_CR15","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1109\/TPWRD.2010.2046654","volume":"25","author":"GN Ericsson","year":"2010","unstructured":"Ericsson GN (2010) Cyber security and power system communication\u2014essential parts of a smart grid infrastructure. IEEE Trans Power Delivery 25(3):1501\u20131507","journal-title":"IEEE Trans Power Delivery"},{"issue":"4","key":"4453_CR16","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/SURV.2012.010912.00035","volume":"14","author":"Y Yan","year":"2012","unstructured":"Yan Y, Qian Y, Sharif H, Tipper D (2012) A survey on cyber security for smart grid communications. IEEE Commun Surv Tutor 14(4):998\u20131010","journal-title":"IEEE Commun Surv Tutor"},{"issue":"4","key":"4453_CR17","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1109\/TSG.2011.2163807","volume":"2","author":"O Kosut","year":"2011","unstructured":"Kosut O, Jia L, Thomas RJ, Tong L (2011) Malicious data attacks on the smart grid. IEEE Trans Smart Grid 2(4):645\u2013658","journal-title":"IEEE Trans Smart Grid"},{"key":"4453_CR18","doi-asserted-by":"crossref","unstructured":"Kosut O, Jia L, Thomas RJ, Tong L (2010) Malicious data attacks on smart grid state estimation: attack strategies and countermeasures. In: 2010 1st IEEE international conference in smart grid communications (Smart Grid Comm), pp 220\u2013225","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"4453_CR19","unstructured":"Kosut O, Jia, L, Thomas, RJ, Tong L (2010) On malicious data attacks on power system state estimation. In: 2010 international universities power engineering conference (UPEC), 45th conference IEEE, pp 1\u20136"},{"key":"4453_CR20","doi-asserted-by":"crossref","unstructured":"Kosut O, Jia L, Thomas RJ, Tong L (2010) Limiting false data attacks on power system state estimation. In: 2010 conference on information sciences and systems (CISS), 44th annual conference IEEE, pp 1\u20136","DOI":"10.1109\/CISS.2010.5464816"},{"key":"4453_CR21","doi-asserted-by":"crossref","unstructured":"Qin Z, Li Q, Chuah MC (2012) Unidentifiable attacks in electric power systems. In: 2012 Proceedings of IEEE\/ACM, 3rd international conference on cyber-physical systems IEEE Computer Society, pp 193\u2013202","DOI":"10.1109\/ICCPS.2012.27"},{"key":"4453_CR22","doi-asserted-by":"crossref","unstructured":"Yang J, Wu W, Zheng W, Xian W, Zhang B (2016) Performance analysis of sparse recovery models for bad data detection and state estimation in electric power networks. In: 2016 power and energy society general meeting (PESGM) IEEE, pp 1\u20135","DOI":"10.1109\/PESGM.2016.7741885"},{"issue":"6","key":"4453_CR23","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1109\/JSAC.2012.120709","volume":"30","author":"O Vukovic","year":"2012","unstructured":"Vukovic O, Sou KC, Dan G, Sandberg H (2012) Network-aware mitigation of data integrity attacks on power system state estimation. IEEE J Sel Areas Commun 30(6):1108\u20131118","journal-title":"IEEE J Sel Areas Commun"},{"issue":"4","key":"4453_CR24","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1109\/TPWRS.2006.881149","volume":"21","author":"J Chen","year":"2006","unstructured":"Chen J, Abur A (2006) Placement of PMUs to enable bad data detection in state estimation. IEEE Trans Power Syst 21(4):1608\u20131615","journal-title":"IEEE Trans Power Syst"},{"issue":"7","key":"4453_CR25","first-page":"1735","volume":"12","author":"Q Yang","year":"2017","unstructured":"Yang Q, An D, Min R, Yu W, Yang X, Zhao W (2017) On optimal PMU placement-based defense against data integrity attacks in smart grid. IEEE Trans Inf Forensics Secur 12(7):1735\u20131750","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"4453_CR26","doi-asserted-by":"crossref","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","volume":"57","author":"W Wang","year":"2013","unstructured":"Wang W, Lu Z (2013) Cyber security in the smart grid: survey and challenges. Comput Netw 57(5):1344\u20131371","journal-title":"Comput Netw"},{"issue":"3","key":"4453_CR27","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1109\/TII.2015.2420951","volume":"11","author":"S Pan","year":"2015","unstructured":"Pan S, Morris T, Adhikari U (2015) Classification of disturbances and cyber-attacks in power systems using heterogeneous time-synchronized data. IEEE Trans Industr Inf 11(3):650\u2013662","journal-title":"IEEE Trans Industr Inf"},{"key":"4453_CR28","doi-asserted-by":"crossref","unstructured":"Lin H, Deng Y, Shukla S, Thorp J, Mili L (2012) Cyber security impacts on all-PMU state estimator-a case study on co-simulation platform GECO. In: 2012 3rd international conference smart grid communications (Smart Grid Comm.) IEEE, pp 587\u2013592","DOI":"10.1109\/SmartGridComm.2012.6486049"},{"key":"4453_CR29","doi-asserted-by":"crossref","unstructured":"Xu W, Hu G, Ho DW, & Feng Z (2019). Distributed secure cooperative control under denial-of-service attacks from multiple adversaries. IEEE Trans Cybern (in press)","DOI":"10.1109\/TCYB.2019.2896160"},{"issue":"3","key":"4453_CR30","doi-asserted-by":"crossref","first-page":"1012","DOI":"10.1109\/TCST.2017.2789182","volume":"27","author":"Z Feng","year":"2019","unstructured":"Feng Z, Hu G (2019) Secure cooperative event-triggered control of linear multiagent systems under DoS attacks. IEEE Trans Control Syst Technol 27(3):1012\u20131022","journal-title":"IEEE Trans Control Syst Technol"},{"key":"4453_CR31","unstructured":"Hink RCB, Beaver JM, Buckner MA, Morris T, Adhikari U, Pan S (2014) Machine learning for power system disturbance and cyber-attack discrimination. In: 2014 resilient control systems (ISRCS) 7th international symposium IEEE, pp 1\u20138"},{"issue":"9","key":"4453_CR32","doi-asserted-by":"crossref","first-page":"2040","DOI":"10.1016\/j.comnet.2013.04.005","volume":"57","author":"A Fahad","year":"2013","unstructured":"Fahad A, Tari Z, Khalil I, Habib I, Alnuweiri H (2013) Toward an efficient and scalable feature selection approach for internet traffic classification. Comput Netw 57(9):2040\u20132057","journal-title":"Comput Netw"},{"key":"4453_CR33","doi-asserted-by":"crossref","unstructured":"Gong Y, Fang Y, Liu L, Li J (2014) Multi-agent intrusion detection system using feature selection approach. In: 2014 10th international conference on IEEE in intelligent information hiding and multimedia signal processing (IIH-MSP), pp 528\u2013531","DOI":"10.1109\/IIH-MSP.2014.137"},{"key":"4453_CR34","unstructured":"Wu Y, Onwuachumba A, Musavi M (2013) Bad data detection and identification using neural network-based reduced model state estimator. In: 2013 green technologies conference IEEE, pp 183\u2013189"},{"key":"4453_CR35","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"SA Mirjalili","year":"2016","unstructured":"Mirjalili SA, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51\u201367","journal-title":"Adv Eng Softw"},{"key":"4453_CR36","doi-asserted-by":"crossref","unstructured":"Yamany W, Fawzy M, Tharwat A, Hassanien AE (2015) Moth-flame optimization for training multi-layer perceptrons. In: 2015 computer engineering conference (ICENCO), 11th international IEEE, pp 267\u2013272","DOI":"10.1109\/ICENCO.2015.7416360"},{"issue":"3","key":"4453_CR37","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.jcde.2019.02.002","volume":"6","author":"SM Bozorgi","year":"2019","unstructured":"Bozorgi SM, Yazdani S (2019) An improved whale optimization algorithm for optimization problems. J Comput Design Eng 6(3):243\u2013259","journal-title":"J Comput Design Eng"},{"issue":"1","key":"4453_CR38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00500-016-2442-1","volume":"22","author":"I Aljarah","year":"2018","unstructured":"Aljarah I, Faris H, Mirjalili S (2018) Optimizing connection weights in neural networks using the whale optimization algorithm. Soft Comput 22(1):1\u201315","journal-title":"Soft Comput"},{"issue":"8","key":"4453_CR39","doi-asserted-by":"crossref","first-page":"2005","DOI":"10.1007\/s00521-016-2190-2","volume":"28","author":"S Chatterjee","year":"2017","unstructured":"Chatterjee S, Sarkar S, Hore S, Dey N, Ashour AS, Balas VE (2017) Particle swarm optimization trained neural network for structural failure prediction of multistoried RC buildings. Neural Comput Appl 28(8):2005\u20132016","journal-title":"Neural Comput Appl"},{"issue":"3","key":"4453_CR40","first-page":"32","volume":"159","author":"RT Ibrahim","year":"2017","unstructured":"Ibrahim RT, Mohammed ZT (2017) Training recurrent neural networks by a hybrid PSO-cuckoo search algorithm for problems optimization. Int J Comput Appl 159(3):32\u201338","journal-title":"Int J Comput Appl"},{"key":"4453_CR41","doi-asserted-by":"crossref","unstructured":"Chatterjee S, Dzitac S, Sen S, Rohatinovici N., Dey N, Ashour AS, Balas VE (2017) Hybrid modified cuckoo search-neural network in chronic kidney disease classification. In: 2017 engineering of modern electric systems (EMES), 14th international conference IEEE, pp 164\u2013167","DOI":"10.1109\/EMES.2017.7980405"},{"key":"4453_CR42","doi-asserted-by":"crossref","unstructured":"Chaowanawatee K, Heednacram A (2012) Implementation of cuckoo search in RBF neural network for flood forecasting. In: 2012 computational intelligence communication systems and networks (CICSyN), 4th international conference IEEE, pp 22\u201326","DOI":"10.1109\/CICSyN.2012.15"},{"issue":"2","key":"4453_CR43","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18(2):1153\u20131176","journal-title":"IEEE Commun Surv Tutor"},{"issue":"19","key":"4453_CR44","first-page":"28","volume":"9","author":"R Bhesdadiya","year":"2016","unstructured":"Bhesdadiya R, Jangir P, Jangir N, Trivedi IN, Ladumor D (2016) Training multi-layer perceptron in neural network using whale optimization algorithm. Indian J Sci Technol 9(19):28\u201336","journal-title":"Indian J Sci Technol"},{"issue":"6","key":"4453_CR45","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1623\/hysj.49.6.1025.55720","volume":"49","author":"\u00d6 Kisi","year":"2004","unstructured":"Kisi \u00d6 (2004) Multi-layer perceptrons with Levenberg\u2013Marquardt training algorithm for suspended sediment concentration prediction and estimation Levenberg\u2013Marquardt. Hydrol Sci J 49(6):1025\u20131040","journal-title":"Hydrol Sci J"},{"key":"4453_CR46","unstructured":"Power System Attack Datasets\u2014Mississippi State University and Oak Ridge National Laboratory (2014) \nhttp:\/\/www.ece.uah.edu\/~thm0009\/icsdatasets\/PowerSystem_Dataset_README.pdf\n\n. Accessed 15 Feb 2018"},{"key":"4453_CR47","unstructured":"Hsu J, Mudd D, Thornton Z (2014) Mississippi State University Project Report-SCADA Anomaly Detection \nhttp:\/\/www.ece.uah.edu\/~thm0009\/icsdatasets\/MSU_SCADA_Final_Report.pdf\n\n. Accessed 3 June 2018"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-019-04453-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-019-04453-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-019-04453-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T23:23:02Z","timestamp":1598311382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-019-04453-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":47,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["4453"],"URL":"https:\/\/doi.org\/10.1007\/s00521-019-04453-w","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"6 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical statement"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}